Abstract
Trusted Computing technology is now able to provide solutions to today’s enterprise IT security issues. There is a need to increase control over the corporate network. Mobility increases productivity, but with new risks, which have to be handled by technology that is able to ensure security with acceptable costs. Creating security needs well-thought-out concepts, technology, infrastructures, and people who develop, communicate with, and use security products. This paper is intended to deliver one full line of a picture of Trusted Computing, starting with the objectives, looking at the status of Trusted Computing today, and some existing applications, and ending with a view of what will come next.
Broadly-accepted standards are an important prerequisite for any new concept or technology. The Trusted Computing Group (TCG) is the industry-accepted standards body which combines the IT security expertise in Mobile Security of vendors such as Utimaco Safeware AG. Case studies help integrate the views of customers in the presentation on products and vision
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Koehler, A.W. (2004). Trusted Computing: From Theory to Practice in the Real World. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-322-84984-7_21
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-05910-1
Online ISBN: 978-3-322-84984-7
eBook Packages: Springer Book Archive